IT consulting and tech support blog

Battling fake Microsoft Support scammers

Published November 10, 2014

Microsoft scam graphic
Screenshot of Netstat
Screenshot of CPU monitor
Screenshot of Event Viewer
Screenshot of fake warning

Fake antivirus support is a problem. We know fake “Microsoft representatives” call targeted Windows users to persuade them that their computers are inundated with warnings and errors as shown in the Windows Event Viewer, a legitimate Microsoft application that lists system information. We even watched Jerome Segura, a senior security researcher at Malwarebytes—catch some of these over-the-phone tactics on video. Unfortunately it seems scammers still use the telephone to cold call folks…Read more


NRC’s George T Probst films first 360-degree great white shark video

Published November 03, 2014

Underwater close-up photo of a great white shark approaching the camera.

George Probst, NRC's web designer, was asked early this year to test out a new underwater camera rig that films 360° footage. In addition to George's work at NRC, he's also an accomplished underwater wildlife photographer, who specializes in shark. George took the Kolor Abyss 360 on his recent great white shark diving trip to Isla de Guadalupe, and was able to capture some close-up footage of great white sharks. As far as we know, this is the first published video footage of great white sharks…Read more


NRC’s George Probst recognized by Yahoo!

Published July 28, 2014

Many of you know George Probst as NRC’s graphic designer and web developer, but there’s more than marketing in his tool belt. When he’s not working, George has some interesting hobbies: running, Metallica concerts, and…shark diving. At least once a year, he ventures to Guadalupe, Mexico to swim with great white sharks. Not only does George swim with them, but he has also developed a keen eye for their best poses through underwater photography, which was recently recognized by Yahoo’s…Read more


The dangers of peer-to-peer-file sharing

Published April 25, 2014

Graphic illustrating peer to peer connections

Peer-to-Peer or P2P is a method of sharing of files between two or more computers on the Internet. Users share files via P2P by using peer-to-peer applications such as Gnutella, KaZaA, iMesh, LimeWire, Morpheus, SwapNut, WinMX, AudioGalaxy, Blubster, eDonkey, BearShare etc., and list goes on and on. How P2P Works The P2P application takes a piece of allotted data or sometimes whole directories from your hard drive and allows other users to freely download this content, and vice versa. P2P…Read more


Computers cannot survive by anti-virus software alone

Published February 06, 2014

Over the past few weeks, several widely knows companies have been competing for top spots in many of the major news headlines but, for all the wrong reasons. Retail giant Target, to offer just one recent example, could be forced to pay millions of dollars to cover the direct damages incurred from the recent malware-related data breach that enabled cyber-criminals to steal credit card data from all Target point-of-sale systems located within the United States and Canada. While financial loss is…Read more


Get a quote!

Your request has been successfully submitted.

Thank you for contacting New River Computing. We will respond to you as soon as possible.